Add the JSON button to the contact page. If the user clicks on the JSON button, you should create a JSON object based on the information that the user entered in the contact page. Before creating a JSON object, you must validate the user inputs. If the user inputs are valid, you should create a JSON object. Otherwise, you should inform the user that the user inputs are invalid.

Answers

Answer 1

Therefore, by adding the JSON button to the contact page and implementing the necessary JavaScript code, you can create a JSON object based on the user's inputs. However, it is important to validate the inputs before creating the JSON object to ensure its accuracy and reliability.

To add the JSON button to the contact page and create a JSON object based on the user's inputs, follow these steps:

1. Implement the JSON button on the contact page. This can be done by adding a button element to the page's HTML code with an appropriate identifier or class.

2. When the user clicks on the JSON button, trigger a JavaScript function to handle the event.

3. In the JavaScript function, retrieve the user's inputs from the contact page. This can be done by accessing the relevant form elements and extracting their values.

4. Validate the user inputs to ensure they meet the required criteria. For example, check if required fields are filled, validate email formats, or enforce any specific constraints.

5. If the inputs are valid, proceed to create the JSON object. Use the retrieved user inputs to populate the JSON object's properties.

6. Display the JSON object to the user. This can be done by converting the object to a string using the JSON.stringify() method and presenting it in a readable format on the page.

7. If the inputs are invalid, inform the user that their inputs are not valid. This can be done by displaying an error message on the contact page or using a popup notification.

By adding the JSON button to the contact page and implementing the necessary JavaScript code, you can create a JSON object based on the user's inputs. However, it is important to validate the inputs before creating the JSON object to ensure its accuracy and reliability. If the inputs are valid, the JSON object can be displayed to the user. If the inputs are invalid, the user should be informed accordingly. Remember to use appropriate coding practices and techniques to handle the user's inputs and provide a seamless user experience.

To learn more about popup visit:

brainly.com/question/32420986

#SPJ11


Related Questions

typically, users or user groups are given account numbers protected by passwords, which they can use to gain access to the database. a dbms should provide a

Answers

A DBMS (Database Management System) should provide a secure and controlled access mechanism for users or user groups. This is typically done by assigning account numbers and protecting them with passwords.

Explanation:
1. The first step in providing secure access to a database is to assign each user or user group a unique account number. This helps in identifying and tracking the actions of individual users.
2. The account numbers are then protected by passwords. Passwords serve as a means of authentication, ensuring that only authorized users can gain access to the database.
3. When a user wants to access the database, they need to provide their account number and password. The DBMS verifies the authenticity of the user by comparing the provided password with the one stored in its system.
4. If the password matches, the user is granted access to the database. They can then perform the necessary operations on the data, such as querying, inserting, updating, or deleting records.
5. It is essential for a DBMS to provide a secure access mechanism to prevent unauthorized access to the database, protect the integrity of the data, and ensure the confidentiality of sensitive information.

Conclusion:
In conclusion, a DBMS should provide a secure and controlled access mechanism for users or user groups. This involves assigning account numbers protected by passwords, which users can use to gain access to the database. By implementing these measures, the DBMS ensures the security and integrity of the database.

To know more about Database visit

https://brainly.com/question/30163202

#SPJ11

two hosts, a and b, are separated by 20,000 kilometers and are connected by a direct link of 1 mbps. the signal propagation speed over the link is 2.5 × 108 meters/sec. a. what are the one-way propagation delay and round-trip time? b. calculate the bandwidth-delay product, ???????? ⋅ ????????prop. c. what is the bit time? d. what is the maximum number of bits on the link at any given time if a sufficiently large message is sent? e. what is the width (in meters) of a bit in the link? f. derive a general expression for the width of a bit in terms of the propagation speed ????????, the transmission rate ????????, and the length of the link mm.

Answers

a. One-way propagation delay and Round-trip time:

Propagation delay = distance / propagation speed

Time = distance / speed

Let's first find out the one-way propagation delay:

Propagation Delay = 20000 / (2.5 ×  108)

Seconds  Propagation Delay = 80 microseconds (μs)

Round-Trip Time = 2 *

Propagation Delay Round-Trip Time = 2 * 80 μs

Round-Trip Time = 160 μs

b. Bandwidth-delay product:

Bandwidth-Delay Product = Transmission Rate * Propagation Delay

Bandwidth-Delay Product = 1,000,000 bits/second * 80

microseconds Bandwidth-Delay Product = 80,000 bits

c. Bit time:

Bit time is the time required to transmit a single bit over a link.

Bit time = 1 / Transmission Rate

Bit time = 1 / 1,000,000Bit time = 1 μs

d. Maximum number of bits on the link at any given time:

Maximum number of bits on the link = Bandwidth-Delay Product Maximum number of bits on the link = 80,000 bits

e. Width of a bit in the link:

Width of a bit = Propagation Speed / Transmission Rate

Width of a bit = 2.5 × 108 / 1,000,000

Width of a bit = 250 meters / second

f. Deriving a general expression for the width of a bit:

Width of a bit = Propagation Speed / Transmission Rate

Width of a bit = (Distance / Time) / Transmission Rate

Width of a bit = (Distance / Transmission Rate) / Time

Width of a bit = Length of the link / Bandwidth-Delay Product

Width of a bit = L / (R * Propagation Delay)

Therefore, the expression for the width of a bit in terms of propagation speed, transmission rate, and the length of the link is:

Width of a bit = L / (R * Propagation Delay)

To know more about Bandwidth-delay product refer to:

https://brainly.com/question/32167427

#SPJ11

Complete a procurement plan for the project provided by your instructor. Changing topics is not permitted. 2. You must create your procurement plan based on the course materials. Do not use a template from an external source. 3. Use multiple sources to develop your understanding of the project procurement process. Recommended starting points a. Kerzner eText b. PMBOK Guide c. Course material 4. Create a professional looking document that includes a title page, table of contents, and bibliography. APA standards must be followed. 5. Assignment length: minimum 2 pages excluding title page, table of contents and bibliography pages. 6. Submit your assignment to the drop box: Assignment 1 . Only one submission is permitted. Therefore, ensure that you create your own work before it's submitted to the drop box. Your organization strongly supports the goals of the United Nations' PRME (Principles for Responsible Management Education). The organization has begun its first PRME project, a high priority and highly visible initiative. You have been named project manager. The project will identify and establish ongoing relationships with corporate partners worldwide. The partnerships will promote the development, transfer, dissemination and diffusion of environmentally sounc educational technologies to developing countries on favorable terms, including concessional and preferential project will be a content delivery platform for elementary and secondary school organizations. D2L (eConestoga) is an example of this technology. It is expected that several partners will be required to fulfill all the needs of the school organizations. Preference will be given to partners in developing nations, partners with visible minorities and women as the majority shareholders. Partners should be ready to work with school organizations on January 1, 2024. Partners may have one or more of the following responsibilities. - Develop and build educational technologies. - Customize technology to fit the needs of the school organization. - Install the technology in the school system. - Train teachers in how to use the technology in their first language. - Create training materials for students. - Deliver periodic upgrades to the technology as well as ongoing user support. Procurement Plan Contents

Answers

The procurement plan for the United Nations' PRME project, with a content delivery platform for elementary and secondary school organizations,

project's goals and objectives are achieved through the timely and cost-effective procurement of necessary goods, services, and works. The procurement plan for the PRME project is a comprehensive plan that includes detailed procurement activities and schedules to acquire the needed goods, services, and works. The procurement plan comprises of the following contents:Project Scope: The PRME project's scope will be defined in terms of what is to be procured, the procurement processes to be utilized, and the procurement schedule.Procurement Methodology: This section describes the procurement processes to be utilized to acquire the necessary goods, services, and works for the project.

The procurement processes must comply with the organization's procurement policy and applicable laws and regulations. Procurement Schedule: This section provides a schedule for all procurement activities, including the expected timeframes for the delivery of the goods, services, and works. It should include the following details:Procurement Activities: This section provides an overview of all the procurement activities that will be undertaken, including the types of goods, services, and works required. It should include a description of the requirements, specifications, standards, and quality controls for each item.Procurement Budget

To know more about project visit:

https://brainly.com/question/32805877

#SPJ11

Differentiate between philanthropic model of CSR and social web
of CSR.

Answers

The philanthropic model of CSR focuses on charitable giving and donations, while the social web of CSR emphasizes sustainable and responsible business practices that benefit society as a whole.

The philanthropic model of CSR involves corporations making monetary contributions to various charitable causes and organizations. This approach is often characterized by one-time donations or sporadic acts of charity.

The primary aim is to support specific social causes and address immediate societal needs. While these philanthropic initiatives can bring positive impact and provide immediate relief, they may not always address the underlying systemic issues contributing to social problems.

On the other hand, the social web of CSR revolves around integrating social and environmental considerations into a company's core business strategy. This approach focuses on long-term sustainability and the creation of shared value for both the company and society.

It involves practices such as ethical sourcing, reducing environmental impact, promoting employee well-being, and fostering community development. The social web of CSR recognizes that businesses have a responsibility to operate in a manner that aligns with societal expectations and contributes positively to the communities they operate in.

In summary, the key difference between the philanthropic model of CSR and the social web of CSR lies in their respective approaches. The philanthropic model primarily involves charitable giving and one-time donations, while the social web model emphasizes integrating responsible and sustainable practices into a company's core operations.

Learn more about CSR

brainly.com/question/32771188

#SPJ11

In a computer with base and limit registers for address space protection the address generated by an instruction is 329048. At that time the base register value is 256400 and the limit register value is 128680. What is the address used by the memory subsystem to fetch the data

Answers

To summarize, the address used by the memory subsystem to fetch the data is 329048.

The base and limit registers in a computer are used for address space protection.

In this case, the instruction generates an address of 329048, while the base register value is 256400 and the limit register value is 128680.

To determine the address used by the memory subsystem to fetch the data, we need to check if the generated address falls within the range specified by the base and limit registers.

The address is within the range if:
(base register value) ≤ (generated address) ≤ (base register value + limit register value)

In this case:
256400 ≤ 329048 ≤ 256400 + 128680

Simplifying:
256400 ≤ 329048 ≤ 385080

Since 329048 satisfies this condition, the memory subsystem will use this address to fetch the data.

To know more about memory subsystem, visit:

https://brainly.com/question/32353027

#SPJ11



N processes are running concurrently in a virtual memory system. A dedicated disk is used for paging.
Explain whether N should be increased, decreased, or left unchanged, if it is observed that the CPU utilization is very low and disk utilization is very high.

Answers

To address the observed low CPU utilization and high disk utilization in a virtual memory system with dedicated disk paging, it is recommended to decrease the number of processes (N) to better balance the resource utilization and improve system performance.

If it is observed that the CPU utilization is very low and disk utilization is very high in a virtual memory system with dedicated disk paging, N (the number of processes) should be decreased.

Explanation: In this scenario, the low CPU utilization indicates that the CPU is not being fully utilized, while the high disk utilization suggests that the disk is under heavy load due to excessive paging. This imbalance between CPU and disk utilization indicates that there are too many processes running concurrently, leading to a high demand for memory and excessive paging.

By decreasing the number of processes (N), the overall memory demand and subsequent paging activity can be reduced. This allows for a more efficient utilization of system resources, including the CPU and disk, and can help alleviate the high disk utilization issue.

To know more about memory system visit :

https://brainly.com/question/32124561

#SPJ11

save the file to a new folder inside the documents folder on the computer. name the new folder marketing. name the file businessplanupdated.

Answers

To save the file to a new folder named "marketing" inside the "Documents" folder, you need to create the folder first and then create a new file with the desired name "businessplanupdated" inside the folder.

To save the file to a new folder inside the documents folder on the computer, follow these steps:
1. Open the "Documents" folder on your computer.
2. Right-click on an empty space inside the folder and select "New" from the context menu.
3. Choose "Folder" to create a new folder.
4. Name the new folder "marketing" and press Enter.
5. Open the folder you just created by double-clicking on it.
6. Now, create a new file by right-clicking on an empty space inside the folder and selecting "New" > "Text Document" from the context menu.
7. Rename the file to "businessplanupdated" and press Enter.
8. Double-click on the file to open it and start working on your updated business plan.

To know more about marketing, visit:

https://brainly.com/question/27155256

#SPJ11

T/F Explain. Write True or False and a 2-3 sentence explanation. Many times the answer can be true or false, the explanation is what matters. Improvement in technology will increase inequality.

Answers

False. Improvement in technology does not necessarily lead to increased inequality.

While it is true that technological advancements can result in job displacement and income inequality in some cases, they can also create new opportunities and improve overall living standards. For example, technology has enabled the creation of new industries and job roles, such as software development and data analysis.

Additionally, advancements in technology have made goods and services more accessible and affordable for many people, narrowing the digital divide and reducing inequality. The impact of technology on inequality depends on how it is managed and distributed within society. Therefore, it is not accurate to say that improvement in technology will always lead to increased inequality.

To know more about inequality visit:

brainly.com/question/14200400

#SPJ11

The -9 option to the gzip utility results in a higher compression ratio. true or false

Answers

The statement is false.

The -9 option in the g zip utility does not result in a higher compression ratio. The -9 option actually specifies the highest compression level, which means that it will use more computational resources and take longer to compress the file. However, this higher compression level does not necessarily result in a higher compression ratio. The compression ratio is determined by the content of the file being compressed, not the compression level chosen. In some cases, a lower compression level may actually result in a higher compression ratio if the file contains a lot of redundant or compressible data. Therefore, it is not accurate to say that the -9 option always leads to a higher compression ratio.

To know more about statement visit:

https://brainly.com/question/17238106

#SPJ11

You are required to simulate a project of your choice. The project can be one that you are involved in or one that you are observing. The simulated project should include but not be limited to the following : Project Introduction and background, - Problem statement, - Project aim and objectives, - Process flow of the project that is being simulated, - Simulation of the project using Simio, - Simulation results Discussion (Do they represent the expected results) - Proposed Solutions to the simulated problem (Use simulation to support your suggestion) Conclusion.

Answers

As per the given question, you are required to simulate a project of your choice.

The following are the details that you can include in the simulated project:Project Introduction and backgroundThe first and foremost important detail that you can include in the simulated project is the introduction and background of the project. It is a brief overview of the project that includes the information about the project such as its origin, purpose, objective, etc.Problem statementThe next detail that you can include in the simulated project is the problem statement. After that, the aim and objectives of the project should be defined. It includes the purpose of the project, its objectives, and what it hopes to achieve.

Process flow of the project that is being simulatedThe next detail that you can include in the simulated project is the process flow of the project that is being simulated. It should provide information about the steps involved in the project, their order, and the role of each step.Simulation of the project using SimioAfter that, the project can be simulated using Simio. Simio is a software program that helps to simulate real-world problems. It uses simulation to develop solutions for complex problems.Simulation results DiscussionThe simulation results should be discussed in detail. It is important to see whether they represent the expected results or not

To know more about project visit:

https://brainly.com/question/26741514

#SPJ11

In windows 10, what command will redirect the output of dir command to a local printer?

Answers

In Windows 10, you can use the following command to redirect the output of the dir command to a local printer:

The Command Line to use

dir > LPT1

This command redirects the output of the dir command to the printer connected to the LPT1 parallel port.

You can replace LPT1 with the appropriate port if your printer is connected to a different parallel port, such as LPT2 or LPT3. Keep in mind that this command assumes your printer is set up and configured correctly, and it may require administrative privileges to access the printer port.

Read more about printers here:

https://brainly.com/question/31051187

#SPJ4

Given the following while loop, what is the value variable z is assigned with for the given values of variables a, b and c? mult = 0 while a < 10: mult = b * a if mult > c: break a = a 1 z = a 1)

Answers

The value of variable z is assigned the updated value of variable a (z = a).

Based on the given code, the value of variable z will be the same as the updated value of variable a after the loop ends.

The given code snippet contains a while loop. Let's break it down step by step to determine the value of variable z.

The initial value of the variable mult is set to 0.

The while loop condition checks whether the value of variable a is less than 10.

Inside the loop, the variable mult is assigned the value of the product of variables b and a (mult = b * a).

If the value of mult is greater than the value of variable c, the loop is exited using the break statement.

After the break statement, the value of variable a is updated to a + 1 (a = a + 1).

Finally, the value of variable z is assigned the updated value of variable a (z = a).

Based on the given code, the value of variable z will be the same as the updated value of variable a after the loop ends.

To know more about the word break statement, visit:

https://brainly.com/question/13014006

#SPJ11

The correct question is,

Given the following while loop, what is the value assigned to variable z for the given values of variables a, b and c?

mult = 0;

while (a < 10) { mult = b * a; if (mult > c) {

break;

}

a = a + 1;

}

z = a;

a = 4, b = 5, c = 20

How do user programs and system services interact in a microkernel architecture?

Answers

The microkernel architecture promotes a more reliable, maintainable, and scalable operating system by providing a structured and well-defined way for user programs to interact with system services.

In a microkernel architecture, user programs and system services interact through well-defined interfaces provided by the microkernel.

Here's a step-by-step explanation of how this interaction takes place:

1. User programs are applications or processes running on the operating system. These programs require certain services or functionality from the underlying system.

2. System services, also known as kernel services, are the core components of the operating system responsible for providing low-level functionalities like process management, memory management, device drivers, and inter-process communication.

3. In a microkernel architecture, the microkernel acts as a minimalistic layer that provides only essential services, such as process scheduling, inter-process communication, and memory protection. It delegates other services to separate user-space processes called servers.

4. When a user program needs a particular service, it sends a request to the microkernel, specifying the type of service required.

5. The microkernel then routes the request to the appropriate server process that provides the requested service. For example, if the user program needs to access a file, the microkernel will forward the request to the file server.

6. The server process receives the request from the microkernel and processes it accordingly. It performs the required operations, such as reading or writing data to the file system, and returns the result back to the user program via the microkernel.

7. Once the microkernel receives the response from the server, it passes the result back to the user program, which can then continue its execution based on the received information.

This interaction between user programs and system services in a microkernel architecture ensures a modular and flexible operating system design. The separation of services into individual server processes allows for better fault isolation and easier extensibility. Additionally, the microkernel's role as a mediator ensures that user programs can access the required services without having to deal with the low-level details of the system implementation.

Overall, the microkernel architecture promotes a more reliable, maintainable, and scalable operating system by providing a structured and well-defined way for user programs to interact with system services.

To know more about the word system services, visit:

https://brainly.com/question/32364712

#SPJ11

Other Questions
Express the following as a linear combination of u =(4, 1, 6), v = (1, -1, 5) and w=(4, 2, 8). (17, 9, 17) = i u- i V+ i W Mary and Elmers fifth child, Melvin, was born 6 weeks prematurely and is 1-month old. Sarah, age 13, Martin, age 12, and Wayne, age 8, attend the Amish elementary school located 1 mile from their home. Lucille, age 4, is staying with Marys sister and her family for a week because baby Melvin has been having respiratory problems, and their physician told the family he will need to be hospitalized if he does not get better within 2 days.Choose two or three areas of prenatal care that you would want to discuss with Mary, and then write brief notes about what you know and/or need to learn about Amish values to discuss perinatal care in a way that is culturally congruent.Discuss three Amish values, beliefs, or practices to consider when preparing to do prenatal education classes with Amish patients. A 24.5-kg child is standing on the outer edge of a horizontal merry-go-round that has a moment of inertia of about a vertical axis through its center and a radius of 2.40 m. The entire system (including the child) is initially rotating at 0.180 rev/s.a. What is the moment of inertia of the child + merry go round when standing at the edge?b. What is the moment of inertial of the child + merry go round when standing 1.10 m from the axis of rotation?c. Find the angular velocity if the child moves to a new position 1.10 m from the center of the merry-go-round.d. What is the change in rotational kinetic energy between the edge and 2.40 m distance? The background-attachment property sets whether a background image scrolls with the rest of the page, or is fixed. Michel Foucault. The Fear of Being Watched a. Knowledge & Poweri. Episteme (define)ii. When is power in its most potent form? b. Discipline & Punish i. Why did Foucault study the Panopticon? 1. According to the Foucault, what are the major effects of the Panopticon?ii. What is a disciplinary society? What is an example of it?iii. According to Foucault, why was there a decline of torture and corporal punishment?iv. What are the phases of punishment? (identify and describe)v. What are the three instruments of disciplinary power that Foucault identified? What three countries or empires made up the World War I alliance of the Central Powers?A. Austria-HungaryB. Turkey, or the Ottoman Empire C. U.S. D. Russia E. Germany, or the Prussian Empire a) Whom would Johns audience have identified as the Beast in the Book of Revelation?i) A single individual who would appear at the end of history.ii) Roman Emperors who persecuted the Church (I think this is the right answer, but I'm not sure ).iii) Legalistic Jewish Christians who required Gentile Christians to be circumcised.iv) A spiritual being who would enter into human hearts and deceive them.b) When the people request a king what is Samuels primary argument that Israel ought not to have one?i) The law never provides instruction about kingship.ii) A king will heavily tax the people and take from their resources (I also think this is the right answer, but again, not 100% sure)iii) Kings might commit immoral acts like adultery and murder.iv) Samuels sons are more fit to rule in Israel. Ordena las fases del procedimiento para analizar documentos administrativos y legales.1. Los documentos administrativos y legales en mi comunidad2. Utilidad y caractersticas de los documentos administrativos3. Caractersticas estructurales y grficas de los documentos legales4. Analizar la funcin social de los documentos administrativos y legales What current issues are there in the middle east and can we make any ties to historical events (crusades through the creation of Israel) that still are true? Lets visualize a parallel plate capacitor with a paper dielectric in-between the plates. Now, a second identical capacitor, but this one has a glass sheet in-between now. Will the glass sheet have the same dependence on area and plate separation as the paper?Swapping the paper for glass has what effect? This is the precise idea of dielectric: given the same capacitor, the material makes a difference. Comparing the paper and glass dielectrics, which would have the higher dielectric and hence the higher total capacitance? Why? This is a Multiple Choice Question. Select the ONE answer you think is correct.Why did the Byzantines reject the western insistence on "the primacy of the pope," based on the text Matthew 16:18-19("Thou Art Peter and upon this rock I will build my church")?Because Byzantines regarded the text as a false addition(interpolation) to scripture, deliberately contrived by an early pope to foster the claims of Rome.Because Byzantines believed that westernerswere misreading this text taking it out of context, and not understanding its importance in connection with other New Testament passages, where Christ confers the "power of binding and loosing" on all the apostles.The conflict between Rome and Constantinople was essentially political, and debates over the meaning of this text played little role in episodes of tension and conflict. What is the answer? As the last one is incorrect Money leakages tend to _____ during recessions, causing the actual money multiplier to _____. This is a segment from PBS featuring Emily Oster. Oster is an Economics Professor at Brown. She makes many statements concerning the economics of childcare and parenting. Although there are many topics, she refers to consumer equilibrium in one section.1. What activity does Oster refer to when she invokes marginal utility? +5 pts2. If Oster is hypothesizing about equilibrium in this activity, which she is, what might be additional good/activities should she be including in her analysis? Although it is impossible to specify all goods, think of an additional good/activity upon which equilibrium could be based. +5 pts3. Now examine your other good. What are the requirements for consumer equilibrium for Oster between you chosen good/activity, and the good/activity she specifies? Is it the same for Oster, as it is for other mothers/parents? Why or why not? +15 pts 4. Switching gears: A "mathematically fair bet" is one in which the amount won will on average equal the amount betfor example, when a gambler bets $100 for a 10 percent chance to win $1,000 ($100 = 0.10 $1,000). Assuming diminishing marginal utility of dollars, explain why this is not a fair bet in terms of utility. Why is it a more unfair fair bet when the "house" takes a cut of each dollar bet? Is gambling irrational? +8 pts Project Q is expected to produce and sell 3 million units per year, priced at $24.99. The costs of producing are estimated to be $17.08 per unit. The equipment and project will last for 4 years. Annual operating expenses are estimated to be $8 million per year. The initial cost of machinery for Project Q is $40 million and will last for 4 years. Calculate the Year 1 Incremental EBIT produced by Project Q.Now, Project Q will require a $2 million increase in Net Working Capital that will be recovered at the end of Year 4. The tax rate for the firm considering Project Q is 25%. The WACC is 10%. Determine the NPV for Project Q. (Enter NPV in millions up to 2 decimal places or more) Which of the following is NOT a stage of speech production?a. phonological levelb. morphological levelc. semantic leveld. syntactic levele. sound perception level Use an inverse matrix to solve each question or system.[-6 0 7 1][-12 -6 17 9] Consider the same problem as 5_1. In case A, the collision time is 0.15 s, whereas in case B, the collision time is 0.20 s. In which case (A or B), the tennis ball exerts greatest force on the wall? Vector Diagram Case A Case B Vi= 10 m/s Vf=5 m/s V=30 m/s =28 m/s Roberto is observing a black hole using the VLA at 22 GHz. What is the wavelength of the radio emission he is studying? (Speed of light 3 x 10' m/s) a. 1.36 nm b. 1.36 mm c. 1.36 cm d. 1.36 m Mega A person's mouth starts watering every time they see fried chicken, even if they are not hungry. This proves that ______plays a powerful role in our decision to start eating or not. a.instinct b.goals c.drives d.memory If someone believes that they are academically gifted, spends lots of time studying, and happen to go to an academically rigorous school, then they are probably experiencing _____a.reciprocal determinismb.external locus of control c.incongruence d.manifest content